MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f6b63b291d9596ec5ab7aa65997850c9ac23feb8e5e67a1bf09dfc84221d10bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 15


Intelligence 15 IOCs YARA 6 File information Comments

SHA256 hash: f6b63b291d9596ec5ab7aa65997850c9ac23feb8e5e67a1bf09dfc84221d10bd
SHA3-384 hash: e1fd49ac4bcf085f4486804c02dd910194f22a024133e7e3277bad62c2fe9ba5002d9273c491145fd1bf9f60fba4dce8
SHA1 hash: ee367e9cb36fd45a05fc6c9a701628b8b1aec61f
MD5 hash: a5880a35912f31af3d9544bfb69e1806
humanhash: nuts-harry-papa-may
File name:PO#_Order-2025-May.bat
Download: download sample
Signature RemcosRAT
File size:1'002'504 bytes
First seen:2025-05-06 08:57:38 UTC
Last seen:2025-05-13 13:52:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:0TIMJpKCG8rb/vTmxK26TCiLFKumDWEmu:GI+cCDr+R6BpKr3
Threatray 855 similar samples on MalwareBazaar
TLSH T11925234EB669EBA2C3BC0F32C017485902E394E1F9A4E2A55DD94EF00C757DCC2D999B
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10522/11/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4504/4/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
dhash icon 70e8e09e9ad8d0e1 (9 x Formbook, 3 x RemcosRAT, 3 x SnakeKeylogger)
Reporter adrian__luca
Tags:exe RemcosRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
424
Origin country :
HU HU
Vendor Threat Intelligence
Verdict:
Malicious
Score:
92.5%
Tags:
spawn shell sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Restart of the analyzed sample
Creating a file
Creating a process from a recently created file
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
expired-cert invalid-signature masquerade obfuscated obfuscated packed packed packer_detected signed
Verdict:
Malicious
Labled as:
HackTool[Obfuscator]/MSIL.DeepSea
Result
Threat name:
Detection:
malicious
Classification:
rans.phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Attempt to bypass Chrome Application-Bound Encryption
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates autostart registry keys with suspicious names
Detected Remcos RAT
Found evasive API chain checking for user administrative privileges
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Potential Data Stealing Via Chromium Headless Debugging
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1681989 Sample: PO#_Order-2025-May.bat.exe Startdate: 06/05/2025 Architecture: WINDOWS Score: 100 102 103.28.89.34 AMARUTU-TECHNOLOGYNL Malaysia 2->102 104 geoplugin.net 2->104 118 Suricata IDS alerts for network traffic 2->118 120 Found malware configuration 2->120 122 Malicious sample detected (through community Yara rule) 2->122 124 15 other signatures 2->124 11 PO#_Order-2025-May.bat.exe 7 2->11         started        15 process.exe 2->15         started        17 process.exe 2->17         started        19 2 other processes 2->19 signatures3 process4 file5 96 C:\Users\user\AppData\Roaming\IqnIEL.exe, PE32 11->96 dropped 98 C:\Users\user\AppData\Local\...\tmpF219.tmp, XML 11->98 dropped 100 C:\Users\...\PO#_Order-2025-May.bat.exe.log, ASCII 11->100 dropped 156 Contains functionality to bypass UAC (CMSTPLUA) 11->156 158 Contains functionalty to change the wallpaper 11->158 160 Contains functionality to steal Chrome passwords or cookies 11->160 166 4 other signatures 11->166 21 PO#_Order-2025-May.bat.exe 2 4 11->21         started        25 powershell.exe 23 11->25         started        27 powershell.exe 23 11->27         started        29 schtasks.exe 1 11->29         started        162 Injects a PE file into a foreign processes 15->162 39 3 other processes 15->39 31 process.exe 17->31         started        33 schtasks.exe 17->33         started        164 Multi AV Scanner detection for dropped file 19->164 35 process.exe 19->35         started        37 schtasks.exe 19->37         started        signatures6 process7 file8 90 C:\ProgramData\Tencent\process.exe, PE32 21->90 dropped 92 C:\...\process.exe:Zone.Identifier, ASCII 21->92 dropped 132 Detected Remcos RAT 21->132 134 Creates autostart registry keys with suspicious names 21->134 41 process.exe 5 21->41         started        136 Loading BitLocker PowerShell Module 25->136 44 conhost.exe 25->44         started        46 conhost.exe 27->46         started        48 conhost.exe 29->48         started        50 conhost.exe 33->50         started        52 conhost.exe 37->52         started        54 conhost.exe 39->54         started        signatures9 process10 signatures11 138 Multi AV Scanner detection for dropped file 41->138 140 Attempt to bypass Chrome Application-Bound Encryption 41->140 142 Adds a directory exclusion to Windows Defender 41->142 144 2 other signatures 41->144 56 process.exe 41->56         started        61 powershell.exe 41->61         started        63 powershell.exe 41->63         started        65 schtasks.exe 41->65         started        67 conhost.exe 44->67         started        process12 dnsIp13 112 188.214.39.228, 10101, 49725, 49726 NETFIL-ASBULEVARDULRACOTEANUNR163ARO Romania 56->112 114 geoplugin.net 178.237.33.50, 49729, 80 ATOM86-ASATOM86NL Netherlands 56->114 116 127.0.0.1 unknown unknown 56->116 94 C:\ProgramData\Opera\logs.dat, data 56->94 dropped 146 Detected Remcos RAT 56->146 148 Tries to harvest and steal browser information (history, passwords, etc) 56->148 150 Writes to foreign memory regions 56->150 154 2 other signatures 56->154 69 recover.exe 56->69         started        72 recover.exe 56->72         started        74 recover.exe 56->74         started        82 2 other processes 56->82 152 Loading BitLocker PowerShell Module 61->152 76 conhost.exe 61->76         started        78 conhost.exe 63->78         started        80 conhost.exe 65->80         started        file14 signatures15 process16 dnsIp17 126 Tries to steal Instant Messenger accounts or passwords 69->126 128 Tries to steal Mail credentials (via file / registry access) 69->128 130 Tries to harvest and steal browser information (history, passwords, etc) 72->130 106 192.168.2.4, 10101, 138, 443 unknown unknown 82->106 85 chrome.exe 82->85         started        88 msedge.exe 82->88         started        signatures18 process19 dnsIp20 108 googlehosted.l.googleusercontent.com 192.178.49.161, 443, 49742 GOOGLEUS United States 85->108 110 clients2.googleusercontent.com 85->110
Threat name:
ByteCode-MSIL.Backdoor.FormBook
Status:
Malicious
First seen:
2025-05-06 08:58:24 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:remcos botnet:new thales 10101b collection credential_access discovery execution persistence rat spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
Uses browser remote debugging
Detected Nirsoft tools
NirSoft MailPassView
NirSoft WebBrowserPassView
Remcos
Remcos family
Malware Config
C2 Extraction:
188.214.39.228:10101
103.28.89.34:10101
Unpacked files
SH256 hash:
f6b63b291d9596ec5ab7aa65997850c9ac23feb8e5e67a1bf09dfc84221d10bd
MD5 hash:
a5880a35912f31af3d9544bfb69e1806
SHA1 hash:
ee367e9cb36fd45a05fc6c9a701628b8b1aec61f
SH256 hash:
6042d647f234809c560c313a1d95ae5d1b975b2e7cecc09974bf94beed21b893
MD5 hash:
c0032c9a7462c28a566b8b16e5cf8bc9
SHA1 hash:
5cfc4b6214e172e9a987a6ceaa5abc747406d783
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
eade1776adf322f1bfd7dd893df35fb410a16f59c4452d557d42c02d7f77a749
MD5 hash:
1fd462a880f17313a11f40e5ada00542
SHA1 hash:
601cac2c68f44a71914b15369f64ea1fdebeea7a
Detections:
win_remcos_w0 win_remcos_auto Remcos malware_windows_remcos_rat win_remcos_rat_unpacked INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
SH256 hash:
b242ad7fad9723e769340e8d6de52706a504dc76d5ad905d4be8a78c5797e7af
MD5 hash:
2aa140d7e89a34db2261ea546d554348
SHA1 hash:
7bca5d640578d47445ee6933fbeaac6cda78eb10
Detections:
INDICATOR_EXE_Packed_SmartAssembly
Parent samples :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 note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

Executable exe f6b63b291d9596ec5ab7aa65997850c9ac23feb8e5e67a1bf09dfc84221d10bd

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments